There you are on a Sunday afternoon, chopping trees punching sheep and building mud huts, a few hours later you’ve been condemned to death by hunger games or something. Oh, the things we do for entertainment. If only the Romans with their bloody murder arenas could have seen us now. Perhaps they would have realized that maybe it would have been more beneficial to maintain a sustainable population of able-bodied men for that encroaching barbarian horde. If only they had picked up a game console instead of crazy uncle Frank’s issue of mutilation monthly when they were still young and impressionable.
This article has been contributed by Aditya Bhadra
Continue reading “Games are Weird”
Consider this – whenever you think of the term “hacking” or hear about different cyber-attacks, the first image that may pop in your mind is probably a guy in a black hoodie, sitting in a dark room, typing away in his laptop. Well, that is not how it works in the real world. This is where social engineering comes into the picture. Social engineering is nothing new though, it dates back to the infamous Trojan Horse that leads to the fall of Troy, but is often overlooked due to lack of awareness.
Continue reading “Dangers of Social Engineering | Cybersecurity Basics”
If you are a tech geek like us here at GeekyMinds, you must have heard the term PWA a lot throughout the past year. It’s the latest buzzword in the web development industry and it seems like everyone is talking about it. Why is it so important for the web developers of today and what’s in it for the common user?
Continue reading “What are Progressive Web Apps (PWAs)?”
SQL stands for Structured Query Language. To understand what SQL Injection is, it is important to understand how information on the web is stored. A database is used to store data such that it is easy to access and manage data efficiently. There are two kinds of databases – Relational and Non-Relational. Relational database stores data in the form of rows and columns while non-relational database store data mainly in four fashions – Key-value, Graph, Column, and Document.
Continue reading “SQL Injection & Prevention | CyberSecurity Basics”
XSS, an acronym derived from Cross ‘X’ Site Scripting, refers to the injection of malicious scripts into a legitimate website or web application. It is similar to other web attacks such as SQL injection, however, it is more devastating since an XSS attack does not target the application concerned rather it puts the users of the application at risk.
Continue reading “Cross-Site Scripting (XSS) Attacks | Cybersecurity Basics”